Protecting users’ privacy is essential for turning networks and services into trustworthy friends. Many privacy enhancing techniques, such as anonymous e-cash and mix-nets, have...
This paper looks at the problem of multi-streaming in 3D teleimmersion and describes how a protocol architecture called CP (for Coordination Protocol) can be used to coordinate vi...
Computer vision methods can be applied to a variety of medical and surgical applications, and many techniques and algorithms are available that can be used to recover 3D shapes and...
Abstract. Model checking suffers not only from the state-space explosion problem, but also from the environment modeling problem: how can one create an accurate enough model of the...
This study concerns virtual environments for training in operational conditions. The principal developed idea is that these environments are heterogeneous and open multi-agent sys...
Cedric Buche, Ronan Querrec, Pierre De Loor, Pierr...